{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-31134","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-03-26T15:04:52.627Z","datePublished":"2025-06-04T19:35:55.749Z","dateUpdated":"2025-06-04T20:07:03.452Z"},"containers":{"cna":{"title":"FreshRSS vulnerable to directory enumeration via ext.php","problemTypes":[{"descriptions":[{"cweId":"CWE-201","lang":"en","description":"CWE-201: Insertion of Sensitive Information Into Sent Data","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","baseScore":5.5,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P","version":"4.0"}}],"references":[{"name":"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-jjm2-4hf7-9x65","tags":["x_refsource_CONFIRM"],"url":"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-jjm2-4hf7-9x65"},{"name":"https://github.com/FreshRSS/FreshRSS/commit/4568111c00813756a3a34a381d684b8354fc4438","tags":["x_refsource_MISC"],"url":"https://github.com/FreshRSS/FreshRSS/commit/4568111c00813756a3a34a381d684b8354fc4438"}],"affected":[{"vendor":"FreshRSS","product":"FreshRSS","versions":[{"version":"< 1.26.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2025-06-04T19:35:55.749Z"},"descriptions":[{"lang":"en","value":"FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, an attacker can gain additional information about the server by checking if certain directories exist. An attacker can, for example, check if older PHP versions are installed or if certain software is installed on the server and potentially use that information to further attack the server. Version 1.26.2 contains a patch for the issue."}],"source":{"advisory":"GHSA-jjm2-4hf7-9x65","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-jjm2-4hf7-9x65","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-04T20:06:04.637737Z","id":"CVE-2025-31134","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-04T20:07:03.452Z"}}]}}